2011
DOI: 10.1007/s11235-011-9589-y
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and consensus overhead in vehicular ad hoc networks

Abstract: Vehicular ad hoc networks aim at increasing passenger safety by exchanging warning messages between vehicles wirelessly. A main challenge is to resist to various malicious abuses and security attacks. However, any security mechanism comes with overhead. We analyze how the authentication algorithm ECDSA and the consensus mechanism impact the vehicular network performance and the braking distance. Processing and communication overheads, decision methods for consensus, are analyzed by analytical models and intens… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 19 publications
0
18
0
Order By: Relevance
“…We derive closed-form expressions to calculate the probability of agreement on a value, P AG , for the pessimistic decision criterion with analysing the two cases, Case I' and Case II'. Combining the expressions for calculating the probability of agreement on a value among processes when they meet the conditions for Case I' and Case II', the probability of agreement on a value among the 4 Initially, the view of all the nodes are incomplete, i.e., formally, the view of a node at the end of (r − 1) th round is incomplete whenever r = 1. processes is computed from Eq. 8.…”
Section: Propositionmentioning
confidence: 99%
See 1 more Smart Citation
“…We derive closed-form expressions to calculate the probability of agreement on a value, P AG , for the pessimistic decision criterion with analysing the two cases, Case I' and Case II'. Combining the expressions for calculating the probability of agreement on a value among processes when they meet the conditions for Case I' and Case II', the probability of agreement on a value among the 4 Initially, the view of all the nodes are incomplete, i.e., formally, the view of a node at the end of (r − 1) th round is incomplete whenever r = 1. processes is computed from Eq. 8.…”
Section: Propositionmentioning
confidence: 99%
“…Examples of the application of such protocols are in the area of cooperative systems including autonomous and semi-autonomous cooperative systems for improving traffic safety and fuel-efficiency of road vehicles, such as vehicle platooning, virtual traffic lights 1 and coordinated lane change [3]. In [4], consensus is used to enforce the security of safety critical applications and to avoid false warning injection attacks in road vehicles. Another set of similar applications are related to the coordination of unmanned aerial vehicles (UAVs), such as the use of consensus to provide reconfigurable control to UAVs in a flight formation [5], or adjust UAVs' trajectories in the presence of collision avoiding manoeuvres that cannot be foreseen [6].…”
Section: Introductionmentioning
confidence: 99%
“…In VANETs with traffic congestion, vehicles may receive thousands of BSMs from neighboring vehicles which make it impossible for vehicles to verify all messages [5,[10][11][12][13][14][15]. is is because the verification process for a message involves a timeconsuming cryptographic operation; for example, it could take at least 4.97 ms on average [16,17]. Due to the high density traffic, the BSM receiving rate is usually higher than the BSM verification rate.…”
Section: Introductionmentioning
confidence: 99%
“…They claimed that their scheme is quite secure and practical for TMIS. Recently, an efficient group key management protocol [19] and an authentication and consensus overhead in vehicular ad hoc networks [20] have been proposed.…”
Section: Introductionmentioning
confidence: 99%